“Anonymity is just a perception. It’s not that somebody owns it but possess it” If you are fully known to an enemy or naked in your battle, you may not even stand a chance. If you are giving every piece of information about yourself to the enemy, then they have the power to think accordingly and counter our every move with a smarter move before we even attacked them with it. Think about it? By the way, I am the of , an online platform for curator CodesMyth Simplifying code and breaking Myths. But what sense does the above things imply? What is happening to our anonymity? Now, we may or may not know it but . In fact, . Some of the government organizations that track us are and much more. What’s their motive? the top government agencies from all around the world are spying on us continuously 24 X 7 by recording our call location, tracking our mobile GPS, Facebook & Twitter Update, online payment logs & bills, CCTV & ATM & other surveillance cameras your every move is being recorded and analyzed by these professionals hiding behind the government mask using some serious deep Learning algorithm CIA, NSA Pentagon NSA — National security agency | CIA — Central intelligence agency Deep learning algorithm — machine trained using algorithm to detect the pattern using the past data. Anonymity — privacy or secure documents Why are they doing that? They think that by being the activity of all the persons all around the globe, . They believe that they can stop these attack by predicting their future moves, thus trying to save millions of lives. . recording they have the potential to separate terrorists from the clusters of common people by analyzing their actions and pasts But, hiding behind this aim they cannot gives excuses on invading the privacy of everyone which itself is a very big crime Does anyone give a shit about anonymity? Yeah, you may not probably know them. Hell, some of you haven’t heard about them. The most popular person among all was the who used to work for . He was unable to give himself excuses regarding what he was doing for the government was right. So, he decided to blew and expose some of the documents which would be enough to prove that the USA government is spying on us. . Due to such act, he had to fly to Russia where he is spending current days along with his wife. . whistleblower Edward Snowden NSA, USA His classified documents can be found out on the deep web We may not know them but a large number of whistleblowers are trying to provide anonymity so that we can have our privacy intact and untouched I haven’t done any wrong in my entire life. Why should I worry about it? In the today’s world of digital information, the most valuable asset of any organization can be its information collected about its users that exists around the globe. . No amount of , , , can buy us that much information which the government agencies and other top brands are acquiring from the unauthorized ways for free. Think about it. These government agencies are now keeping track of all your whereabouts. They access all their data from these websites and cross verify them from other sources too. This isn’t about you money gold diamond bitcoin Google stores data which includes search queries of each Google product, our mail, drive and our other data in their cache for 8 years . Facebook does the same for 5–6 years . With this huge big data and deep machine learning algorithm, they already know where were you a couple of seconds ago, they can predict where you are going to be in the next couple of seconds, next one minute or next hour. All your life will become controlled and all the other factors can be controlled in our life by these external agents. We may end up becoming a sacrificial pawn in their bigger picture. What issues can be removing anonymity causes? Think about it. If you have nothing to hide and you are like an open book, then following things may happen to you: Is it safe to provide such huge amount of information in the hands of a small number of individuals and let them be the undisputed rulers of the world? What’s preventing them from turning against us, the moment things go sideways? What’s preventing them to sell our information from selling our information to the third parties if they need money very badly in order to survive? 1- Your identity is never protected — If someone wants a revenge on you, all they need to know is your schedule, lifestyles and close ones. You may not even know that the person sitting next to you may be there to attempt a hit on you. You may be lucky enough to survive all of these. If they come to know all about our weakness, then all the money and resources in the world won’t be enough to protect you. A good example of this is . The is assigned to each citizen of which is used as an and is required for online registrations for online accounts on websites. According to this, each citizen can create a single account because there will be only 1RRN per citizen. This would remove duplication and forgery. But things didn’t go as planned. Every information, even of the credit card was compromised which is not at all acceptable. South Korea Resident registration number South Korea identifier In 2006, hundreds of thousands of RNNs were leaked from various consumer databases, and these RRNs were used to create false accounts in a game called Lineage as a part of money laundering operations. The worst part is that these RNNs weren’t stolen by hackers, but were sold by company employees with database access. 2- — Some examples of harassment include , and Personal Harassment is not a new term in our digital world one of the most amazing things about the Internet is that it can give voices to those who are actively being silenced, allowing them to speak without fear of repercussion from the shadows. But after removing the anonymity, personal views will be replaced by fear of repercussions thus eliminating the productive and constructive decisions in the era. Doxing swatting revenge porn. In 2011, Mohammed Al-Maskati — an outspoken political activist in Bahrain — as arrested and sequestered for eight days , only being released after having signed an agreement to never again mention Bahrain in any form of media. This only happened because he chooses to use his real name instead of fake name. 3- The sensitive issues will be diminished. They refer to those who need more information on a given topic but don’t want to be caught seeking out that information. Most people actually fall into this group without realizing it. . This person can ask all of their questions in an online community where anonymity exists thereby reducing the risks. One such example is a person who’s struggling with their sexuality, hasn’t gone public with that struggle, but has many unvoiced questions and concerns The list goes on: people who struggle with mental health issues, people who are cheating in relationships, people who need divorce advice, people who are caught up in legal issues and don’t want to incriminate themselves, etc. Is 100%-real online anonymity possible? In my personal opinion, . . . No matter how much advance technologies you are using, NO A big NO No, 100%-real anonymity does not exist at all complete online anonymity is not possible. It depends on the number of government agencies and hackers willing to dedicate their time and resources to put on the use and the importance and sensitivity of the issue that they are handling determines how far they can go to track us. When someone is tracking us, then all we can do is to make their job difficult by using the right set of tools and techniques and not be there at the point where the trail ends. Just try to create it into a dead end. It generally takes months to years in tracking someone who doesn’t want to be tracked. We can use tools, techniques, and concepts (when Implemented) for improving our security, thus reducing the amount of the surveillance and data collection going on, resulting in increasing our anonymity and privacy . These advice matters from person to person and may not be possible for everyone to implement. **The risk involved in using these should not be ignored. Hence, before using them we should learn in deep about them.**Let’s begin with the list, shall we? Can you protect your password? Generally, in some cases, we can see that a large amount of email id and password leaked and distributed for free. . Didn’t get it. Let me tell you in detail. We can remove this problem by creating a password by hashing the URL of the website with our original password We need an for the , in which we will implement a simple procedure. As soon as we click submit after entering our user id and password along with other credentials to create our account, then that extension will start performing its function. extension browsers It will extract the name of the website and password from the Create an Account/Login page and then process them through a hash function. This way, the **password generated will be long, random and nobody will be able to copy it or generate it with ease. This way, the password will become different for the different website.**This work has been done by some Stanford professors. since that too will take a large number of dedicated years and resources. This way, the organizations won’t be having any details of our password. All of this will happen seamlessly . This will also make it difficult for the hackers to crack our password by brute force or any other method SEAMLESSLY — Smoothly and continuously without any gaps. Hash function — a function that can be used to map data of arbitrary size to fixed size. Can you protect your data through paste? A large number of people share data through various online Pastebin unaware that their data is being recorded. Especially coders and developer share their work with peers in the Pastebin. . Data is _in the browser_using Thus, we should use ZeroBin. ZeroBin is a minimalist, opensource online Pastebin where the server has zero knowledge of pasted data encrypted/decrypted 256 bits AES. Image source: Google Images Can you protect yourselves from all the websites you visit? . To avoid all these, we should use which should replace Google Chrome or any other browser. Google Chrome saves all our history Tor Browser Tor generally uses the proxy and our IP’s are jumped from different places at from 3 to 8 times. For e.g., your IP may jump from Honk Kong to Germany to India to Japan. Generally, the hackers can track us within 2–3 levels and hence Tor Browsers are most secure till date. Image source: Google Images What is Tor network and websites? Tor websites are so secure because each hidden service website has a and a corresponding . The is generated by . Nobody can impersonate the hidden service because you need the for it which is known to you only. A Tor network is a network which is completely hidden and provides the capability of anonymity . It also provides access to the dark section of the web which are the unindexed pages which the Clearnet search engines cannot open. These unindexed onion websites on the deep web are known as Tor websites and can be used for legal/not-legal purposes. public key private key onion address hashing the public key and taking half of it private key If your private key is compromised, your domain is gone forever, and you basically have to get a new domain. So, you get the idea of security. To add on to this: ProTip: If someone requests you for proof that you own a domain on the dark web, you can take the public key that corresponds to the domain’s private key and gives it to them. They will use that public key to encrypt that message, then you tell them what their message was by decrypting it with the domain’s private key. If they want to verify it, they can hash it themselves and see the results. Onion Address- such address are not dns address. they uses proxy software. They can be opened through the web browser with the help of tor network Extra security in Tor for anonymity? I assume that if you are using the right now, to be “ ”, then you should and any other , you do that by clicking the besides the Tor onion in your browser, that is , an Add-on for Firefox. Tor Browser Bundle secure disable JavaScript plug-ins “S” “S” NoScript When you have clicked it, then click “ ”, Forbid Scripts Globally (advised) that will make sure no website you visit can run scripts , which may be used to uncover your IP or other terrible things. You are advised to stop scripts because it is believed that some websites of dark web have the power to detect your laptop size, your location and information and even create a backdoor on your system just at the moment you arrived on these sites with the help of the scripts. Can you protect your email? — Random emails. Sometimes we need to provide our in order to get hold of a particular item on the Clearnet. It can be books, a song, a video or movie. email address or sign up Just because we need that item, we end up entering our email or end up authenticating via social websites for sign-up where we end up providing too much information because we are way too much lazy to go other way around. As a result, we end up having in our mail and have to go through the trouble to unsubscribe them. One simple hack is going for and One such mail service is which provides us randomly generated mail for as long as we need them. spams randomly generated email id these email ids can be permanently deleted as soon as our cookie from the local browser is deleted. YOPMAIL Learn more about from . YOPMAIL here Image source: Google Images - Clearnet is also known as the surface web and it is the internet that we uses every day for normal work. Clearnet But, can you protect the data that is going to be stored in the online servers? We all can prepare ourselves to save the data which is stored in our owns system. But what can we do with the data that is stored up in the cloud or server? What about the chats that we have? What about the social media handles that we have? Eventually, the government, hacker or a rogue employee will find a way and then expose everything you wrote anywhere. A simple solution for this is an named provides as the . enables people to trust . The Privly extensions you send it to a server for storage. If you want to learn more about privly by clicking on the following link: open source project Privly Encryption only solution Privly any storage provider by stealing their ability to read your content encrypt our data before Encrypting your data means the server only sees a scrambled version of your content, a link . This way, you can store your data anywhere without losing your privacy. What it does is that it ends up providing seamless injection into our posts converting the text that is to be stored in the database into a link which will point to that text. http://www.codesmyth.com/index.php/2017/07/03/privly-share-private-ly/ Learn more about Privly from . here Image source: Google Images — places where our data is stored safely in servers or clouds Storage provider But, what about the email that I sent? What if someone uses a mail you sent them in a wrong manner? What if they used your documents in a way that you cannot think about? **Thus, sign your emails and other documents including your files with PGP code digitally.**One way to generate your PGP key is through A simple solution for these is by generating a PGP key. PGP stands for Pretty good privacy . In PGP , each person has two “ keys ”: a “public key ” that you give to other people, and a “ private key ” that only you know. You use public keys to encrypt messages and files for others or to add users to PGP Virtual Disk volumes. IGolder Learn more about PGP key generation through Here An example of PGP signature is shown below. Image source: Google Images What can we do in android? In Android, apart from the for posting to social media, we can use and . helps in the , making it difficult for tracking. Orbot can work for all the Android apps. privly Android app Orbot Orfox Orbot proxy and routing the network frequently Orfox is the web browser where you can browse the dark web and open other websites. It basically works on the principal of TOR and is one of the main project of THE TOR FOUNDATION . Learn more about Orbot here Image source: Google Images Learn more about Orfox . here Image source: Google Images Learn more about Privly Android App here Image source: Google Images What can the common man use? In general, always use , since it creates false network or proxies and the hacker tracking you ends up in the location of that false network. One such example is VPN Hotspot Shield. VPN — virtual private network Image source: Google Images Another method is to use where ever possible. Payment by bitcoin is by far the most successful ways to transfer money online. Money transferred with the help of the banks are traced and hence violate privacy. Bitcoin Image source: Google Images This concept, if implemented, will have a great role to play in our anonymity. I haven’t been able to find out OS with such features till now. An Effective OS — A Concept: The following Techs would make it better than other OS’s: An OS for people who hate surveillance of the NSA and governments. An OS for the paranoid and the realistic. · It should perform a **full Remote Mobile Wipe (with encrypted password)**if any of its data is compromised. · It should provide a for the users and all other software. Full multi-layer encryption · It should use . No other browser should be used without routing its network packets through Tor Network Tor as a browser · A (I kind of used some of the blackphones ideas here). A blackphone is a smartphone built to ensure privacy by providing full proof Virus detection and counter data stealing methods internet access through VPN. · It should always and the definitions for these protocols should be updated from time to time block PRISM-related software/sites · (Creates profiles and online identities for fake name and adds pics and bio you select) should be installed to use some one-time services offered by the third party. You can use these on prism sites. Identity Creator software · A USB’s need to be verified before use with to prevent some other from into our system. admin Password creating a backdoor · It should all files and folders as soon as they reach the system. Automatically encrypt · from and folders Preventing software’s/viruses detecting/deleting files · files uploaded to the internet and other devices by using a . Automatically password protects master password · If any PC is connected to the , then our OS should internally detect Bluetooth devices in the area and if they are suspected of being , then the user is warned and Bluetooth hacking software will be opened for user to shut down the devices connectivity. However, if no action is taken within 1 minute it automatically is hacked. (Don’t know this can be done from Wi-Fi too) Bluetooth NSA/PRISM related · Using . Automatic VPN/proxies use and Proxies will rotate in a suitable interval of time · Tor Mail can be used in this context. Free anonymous email installed. · - Have not heard about such software being implemented. Anonymous video chat pre-installed · — The and from the Clearnet torrent does not allow the TOR to function properly and may end up giving our exact location. Anonymous Torrent programs seeders Leachers · and then erases with 40 passes. Wipe PC hotkey 1 verification for password · and then which has some secret key. An Anti-brute force with 5 tries for password auto wipe or unlock from mobile · to know what’s happening around our system when we are not there Anti-remote administration · that if entered will erase everything (Anti-fed) Second password · . Warns if the NSA-related hardware is installed or trying to change administrative permissions This concept is inspired by a technical discussion of the dark web. TAILS OS We can also use which is a designed to direct all your internet traffic through Tor, you can use it in a Virtual Machine but it is probably best if you burn it to a DVD or USB. Tails will leave no trace on the computer you are using and provides all the other security measures. TAILS OS live Operating System It will be good if we all try to acquire some privacy rather than not having it all. These methods help us in acquiring and protecting our personal information. However, it is not possible for all of us to implement these, but we can do whatever it is in our potential to make our lives more secure, make our world more secure and prove it to everyone else that Security is not just an illusion out in the real world. Other than that, don’t be stupid, don’t say or do anything that could reveal the real identity, don’t use nicknames, passwords or anything else that you’ve used on the Clearnet which then could be used to identify you. Remember, the three letters agencies are VERY good on profiling. But none of this makes any sense if are you are not care full and leave hints of who you are here and there.